Revisiting Software Security: Durability Perspective
نویسندگان
چکیده
منابع مشابه
Revisiting Software Security: Durability Perspective
Security is a peak significant quality element in the pitch of software engineering. Software security improvement is easily done with the support of factors, models and metrics of security. Software security should be analyzed with the help of its security factors. Security dimension is the main attribute in evaluation, executing, and calculating security in the way to organize and develop qua...
متن کاملSoftware Security Rules, SDLC Perspective
--Software has become an integral part of everyday life. Everyday, millions of people perform transaction through internet, ATM, mobile phone, they send email & e-greetings, and use word processing and spreadsheet for various purpose. People use software bearing in mind that it is reliable and can be trust upon and the operation they perform is secured. Now, if these software have exploitable s...
متن کاملRevisiting Security Communities after the Cold War : the Constructivist Perspective
History shows that ‘security, whether defined narrowly or widely, is a scarce commodity’. Therefore, it is generally observed that in face of security threat perceptions, states feel the necessity to combine their efforts to strengthen their own security by acting together. This brings us to the concept of collective security, which has been widely debated in the literature of international rel...
متن کاملMaintaining Software with a Security Perspective
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels. These methods are not complete and are difficult to use. Hence it is essential to focus testing effort in areas that have a greater number of security vulnerabilities to develop secure software as well as meet budget ...
متن کاملSecurity protocols from the software verification perspective
We believe that it is important to verify not just the correctness of abstract security protocols, but also to verify the correctness of real implementations of security protocols. Considerable research is needed to facilitate the development process for such implementations both in terms of mathematical formalisms to describe protocols, and tools that carry out their verification. For starters...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Hybrid Information Technology
سال: 2015
ISSN: 1738-9968
DOI: 10.14257/ijhit.2015.8.2.29